Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    115s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/02/2024, 16:30

General

  • Target

    8fa0bd538f66f8892f769a6d35d7e856.exe

  • Size

    2.9MB

  • MD5

    8fa0bd538f66f8892f769a6d35d7e856

  • SHA1

    e9dec00d893f427977eca2c5fe1590e43ff01dde

  • SHA256

    116c0dc015c49f08652117192a1cad1b508c5fbe786bf912ebd575deaaaa27e2

  • SHA512

    2f1b470935ab83124f4bf74ec717bc83841ce2dfeb2cbd84a213a74020ae059548fa7d8b92d3b80c220ecd1428019aa9b100f16f79f017530f85cebefc808c91

  • SSDEEP

    49152:lqQ+qR05iK0DtYJpAF2LiQZMFeMaP4M338dB2IBlGuuDVUsdxxjeQZwxPYRKs:lgBsKo+pAQLDLjgg3gnl/IVUs1jePs

Score
7/10
upx

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe
    "C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe"
    1⤵
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:5112
    • C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe
      C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of UnmapMainImage
      PID:3280

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\8fa0bd538f66f8892f769a6d35d7e856.exe

    Filesize

    641KB

    MD5

    df4b4753d622d1906b8f68c7003f8634

    SHA1

    11ae274a4b8a4607166e3a8454f35cffa210d5b3

    SHA256

    d97cf38db248776280f8b3a305428423b32e6a5fb9d0460ce1bc2c74354950ff

    SHA512

    b4b66322f126cb2d490709cec40e23b6551ffb4b539011cdd95e4a9609fab13cd1d0bf80f5957cc6dba02867c13d5c0df1fcc0a8fd3f3b903757552c73801874

  • memory/3280-13-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/3280-14-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/3280-15-0x0000000001D30000-0x0000000001E63000-memory.dmp

    Filesize

    1.2MB

  • memory/3280-20-0x0000000000400000-0x000000000061D000-memory.dmp

    Filesize

    2.1MB

  • memory/3280-21-0x0000000005630000-0x000000000585A000-memory.dmp

    Filesize

    2.2MB

  • memory/3280-28-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/5112-0-0x0000000000400000-0x00000000008EF000-memory.dmp

    Filesize

    4.9MB

  • memory/5112-1-0x0000000001CD0000-0x0000000001E03000-memory.dmp

    Filesize

    1.2MB

  • memory/5112-2-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB

  • memory/5112-12-0x0000000000400000-0x000000000062A000-memory.dmp

    Filesize

    2.2MB